Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\1728060366c73c2b51b3cccf4f90f5b82277982346f63fadf74c16a31e498f81a01832ef6b761.dat-decoded.exe
|
"C:\Users\user\Desktop\1728060366c73c2b51b3cccf4f90f5b82277982346f63fadf74c16a31e498f81a01832ef6b761.dat-decoded.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
65.52.240.233
|
|||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
65.52.240.233
|
unknown
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2AE1000
|
trusted library allocation
|
page read and write
|
||
802000
|
unkown
|
page readonly
|
||
1B4D3000
|
heap
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
7FFD346BC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD3466D000
|
trusted library allocation
|
page execute and read and write
|
||
2D73000
|
trusted library allocation
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
106D000
|
stack
|
page read and write
|
||
1B70E000
|
stack
|
page read and write
|
||
7FFD34800000
|
trusted library allocation
|
page read and write
|
||
1BF9A000
|
stack
|
page read and write
|
||
7FFD34670000
|
trusted library allocation
|
page read and write
|
||
1B80E000
|
stack
|
page read and write
|
||
1B91C000
|
heap
|
page read and write
|
||
CB5000
|
heap
|
page read and write
|
||
944000
|
stack
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
12AE1000
|
trusted library allocation
|
page read and write
|
||
7FFD34680000
|
trusted library allocation
|
page read and write
|
||
7FFD34664000
|
trusted library allocation
|
page read and write
|
||
D65000
|
heap
|
page read and write
|
||
7FFD34780000
|
trusted library allocation
|
page execute and read and write
|
||
116D000
|
stack
|
page read and write
|
||
C93000
|
trusted library allocation
|
page read and write
|
||
F6C000
|
stack
|
page read and write
|
||
12AE8000
|
trusted library allocation
|
page read and write
|
||
1B600000
|
heap
|
page execute and read and write
|
||
800000
|
unkown
|
page readonly
|
||
7FFD34716000
|
trusted library allocation
|
page read and write
|
||
1B90E000
|
stack
|
page read and write
|
||
1AB10000
|
trusted library allocation
|
page read and write
|
||
CE3000
|
heap
|
page read and write
|
||
C90000
|
trusted library allocation
|
page read and write
|
||
1B97B000
|
heap
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
1BB3F000
|
stack
|
page read and write
|
||
D29000
|
heap
|
page read and write
|
||
C70000
|
trusted library allocation
|
page read and write
|
||
1B4AA000
|
stack
|
page read and write
|
||
1B96D000
|
heap
|
page read and write
|
||
29D0000
|
heap
|
page execute and read and write
|
||
1B4D0000
|
heap
|
page read and write
|
||
7FFD3467D000
|
trusted library allocation
|
page execute and read and write
|
||
1BE9E000
|
stack
|
page read and write
|
||
7FFD34663000
|
trusted library allocation
|
page execute and read and write
|
||
1AE67000
|
heap
|
page read and write
|
||
7FF416AD0000
|
trusted library allocation
|
page execute and read and write
|
||
C00000
|
heap
|
page read and write
|
||
D61000
|
heap
|
page read and write
|
||
D14000
|
heap
|
page read and write
|
||
7FFD34811000
|
trusted library allocation
|
page read and write
|
||
2ADE000
|
stack
|
page read and write
|
||
12AEE000
|
trusted library allocation
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
C45000
|
heap
|
page read and write
|
||
CAD000
|
heap
|
page read and write
|
||
C50000
|
trusted library allocation
|
page read and write
|
||
1BB50000
|
heap
|
page read and write
|
||
1BE5F000
|
stack
|
page read and write
|
||
1B910000
|
heap
|
page read and write
|
||
7FFD34720000
|
trusted library allocation
|
page execute and read and write
|
||
1B94B000
|
heap
|
page read and write
|
||
D0E000
|
heap
|
page read and write
|
||
9B5000
|
heap
|
page read and write
|
||
1C09C000
|
stack
|
page read and write
|
||
2980000
|
heap
|
page read and write
|
||
7FFD34660000
|
trusted library allocation
|
page read and write
|
||
7FFD3468D000
|
trusted library allocation
|
page execute and read and write
|
||
D10000
|
heap
|
page read and write
|
||
1B958000
|
heap
|
page read and write
|
||
CD5000
|
heap
|
page read and write
|
||
7FFD34684000
|
trusted library allocation
|
page read and write
|
||
1B06D000
|
stack
|
page read and write
|
||
7FFD3471C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34710000
|
trusted library allocation
|
page read and write
|
||
800000
|
unkown
|
page readonly
|
||
C40000
|
heap
|
page read and write
|
||
1C39C000
|
stack
|
page read and write
|
||
7FFD34746000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD34672000
|
trusted library allocation
|
page read and write
|
||
1B5D4000
|
stack
|
page read and write
|
There are 74 hidden memdumps, click here to show them.